加载中 . . .
中文标题 作者 论文ID 分类简称 发布时间
WASMixer:用于WebAssembly的二进制混淆 Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang 2308.03123 cs.CR 2023-08-08
使用可撤销范围伪名在边缘提供反向不可链性(扩展版) Cl''audio Correia, Miguel Correia, Lu''is Rodrigues 2308.03402 cs.CR 2023-08-08
TemporalFED:使用分散式联邦学习检测工业时间序列数据中的网络攻击 ''Angel Luis Perales G''omez, Enrique Tom''as Mart''inez Beltr''an, Pedro Miguel S''anchez S''anchez, Alberto Huertas Celdr''an 2308.03554 cs.CR 2023-08-08
Node.js 包中用于漏洞检测的 JavaScript 静态分析工具研究 Tiago Brito, Mafalda Ferreira, Miguel Monteiro, Pedro Lopes, Miguel Barros, Jos''e Fragoso Santos, Nuno Santos 2301.05097 cs.CR 2023-08-07
“Glaze:通过文本到图像模型保护艺术家免受风格模仿” Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao 2302.04222 cs.CR 2023-08-07
通过SGX和区块链加速云存储中安全可验证的数据删除 Xiangman Li and Jianbing Ni 2307.04316 cs.CR 2023-08-07
LISA:具有公共随机源的轻量级单服务器安全聚合 Elina van Kempen and Qifei Li and Giorgia Azzurra Marson and Claudio Soriente 2308.02208 cs.CR 2023-08-07
可压缩和可学习图像加密方案对拼图求解器攻击的安全评估 Tatsuya Chuman and Nobutaka Ono and Hitoshi Kiya 2308.02227 cs.CR 2023-08-07
海报:患者社区——隐私威胁分析的测试床 Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder 2308.02272 cs.CR 2023-08-07
物联网与中间人攻击 Hamidreza Fereidouni, Olga Fadeitcheva and Mehdi Zalai 2308.02479 cs.CR 2023-08-07
通过差分隐私免数据蒸馏进行模型转换 Bochao Liu and Pengju Wang and Shikun Li and Dan Zeng and Shiming Ge 2304.12528 cs.CR 2023-08-04
安全移动内容传输的数字版权管理系统初探 Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis 2308.00437 cs.CR 2023-08-04
SemDiff:通过比较关键语义图进行二进制相似性检测 Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang 2308.01463 cs.CR 2023-08-04
擦除与修复:一种高效的无需盒子的高容量深度隐藏移除攻击 Hangcheng Liu, Tao Xiang, Shangwei Guo, Han Li, Tianwei Zhang, and Xiaofeng Liao 2308.01512 cs.CR 2023-08-04
面向医疗领域的公平和隐私保护联邦学习 Navya Annapareddy, Yingzheng Liu, Judy Fox 2308.01529 cs.CR 2023-08-04
自主身份平台中个人发行者的可验证凭证信任传播协议:VCTP Rahma Mukta, Rue C. Teh, Hye-young Paik, Qinghua Lu and Salil S. Kanhere 2308.01539 cs.CR 2023-08-04
可变活动控制和依赖链路的ACAC\_D模型在智能协同系统中 Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu 2308.01783 cs.CR 2023-08-04
PUF用于公共资源:在操作系统级别增强嵌入式安全 Peter Kietzmann and Thomas C. Schmidt and Matthias W"ahlisch 2301.07048 cs.CR 2023-08-03
硬件设计中信息流的增强符号执行 Kaki Ryan, Matthew Gregoire and Cynthia Sturton 2307.11884 cs.CR 2023-08-03
物联网应用的智能入侵检测系统设计 KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das 2308.00943 cs.CR 2023-08-03
评估和保护群体智慧:零知识证明用于众包真相推断 Xuanming Liu, Xinpeng Yang, Xun Zhang, Xiaohu Yang 2308.00985 cs.CR 2023-08-03
托管你的权益:在权益证明网络中利用非同质化代币和智能合约进行零信任验证器部署 Scott Seidenberger, Alec Sokol, Anindya Maiti 2308.01158 cs.CR 2023-08-03
网络钓鱼PDF文件的大规模研究 Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino 2308.01273 cs.CR 2023-08-03
委派时间锁谜题 Aydin Abadi and Dan Ristea and Steven J. Murdoch 2308.01280 cs.CR 2023-08-03
GrandDetAuto:在大规模自治网络中检测恶意节点 Tigist Abera (1), Ferdinand Brasser (1), Lachlan J. Gunn (2), Patrick Jauernig (1), David Koisser (1), Ahmad-Reza Sadeghi (1) ((1) Technical University of Darmstadt, (2) Aalto University) 1910.05190 cs.CR 2023-08-02